January 18, 2019 | Javvad Malik

Things I Hearted This Week, 18 Jan 2019

London saw a few flakes of snow drop this week, and social media nearly broke with everyone sharing photos of the white pixie dust falling from the sky. Fortunately, I have few friends, and even fewer social media platforms that I use, so was saved from most of the insanity… well, except for my daughter singing “let it…

January 17, 2019 | Tony DeGonia

The Dark Web has a Serious Deduplication Problem

In a post released on 1/8/19, I wrote about the record number of breaches in 2018. This brought to mind a podcast that I was listening to a few days back hosted by Corey Nachreiner, CTO of WatchGuard Technologies, Inc. on his 443 Podcast. Corey discussed the potential data deduplication problem on the Dark Web. This article will attempt to break down how…

Get the latest security news in your inbox.

Subscribe via Email

January 15, 2019 | Devin Morrissey

What Impact Will Cryptocurrency Have in 2019?

According to Investopedia, “cryptocurrency is a digital or virtual currency that uses cryptography for security.” In other words, it’s electric money that is designed to be used by online users both safely and securely. The price of digital currencies, like Bitcoin and Ripple, have been all over the place throughout the past year — mainly because…

January 14, 2019 | Rob Graham

Software Bill of Materials (SBoM) - Does It Work for DevSecOps?

There has been much discussion of a “software bill of materials” (SBoM) lately, for use when addressing security vulnerabilities. Many are curious, wanting to learn more. Googling the term gives lots of positive descriptions. This post will go negative, describing problems with the concept.Rather than cover the entire concept, I want focus on a narrow part of…

January 11, 2019 | Javvad Malik

Things I Hearted This Week, 11th Jan 2019

And we’re back into the swing of things with a proper first week on the books and plenty to talk about as to the weird and wonderful goings on in the world of security, technology and beyond.International Security of MysteryJoe Gray hasn’t really flown outside of the US other than Canada, so when presented…

January 10, 2019 | Kate Brew

Top 12 Blogs of 2018

Time to look back on the top AlienVault blogs of 2018! Here we go:A North Korean Monero Cryptocurrency Miner by Chris DomanCrypto-currencies could provide a financial lifeline to a country hit hard by sanctions. Therefore it’s not surprising that universities in North Korea have shown a clear interest in cryptocurrencies. Recently the Pyongyang University of Science and…

January 9, 2019 | Amy Pace

AlienVault in Gartner MQ for SIEM

Gartner just released their 2018 Magic Quadrant for Security Information and Event Management (SIEM), which we’re once again excited to be part of!Our inclusion in the Gartner SIEM MQ is further validation that our unique, unified approach to threat detection and response continues to resonate.  Many continue to struggle with increasingly advanced threats, expanding attack surfaces, and…

January 8, 2019 | Tony DeGonia

2018 Sees Record Number of Online Retail Data Breaches

During the holiday season people logged on to make purchases through online retailers, like no other time of the year. While there was significant growth in many segments of society on a global scale in 2018, we also  saw a significant increase in online retail breaches where personally identifiable information was compromised at an alarming rate. With more and more…

January 7, 2019 | Tom D'Aquino

Data Exfiltration in AWS: Part 2 of Series

In the previous blog in this four-part blog series, we discussed AWS IAM and how it can be compromised to allow for data exfiltration. In this blog we will drill into data exfiltration.One of the more common issues reported on lately involves EC2 instances running data storage services like Elasticsearch and MongoDB, which by default don't have any…

January 4, 2019 | Javvad Malik

Things I Hearted This Week, 4th Jan 2019

Welcome to 2019! I hope that you had a well-deserved break over the holidays, and a special shout out to all the people that carried on pulling shifts in the SOC, were on-call, and helped ensure stuff stayed as secure as possible while the rest of us were eating and sleeping too much! I’ve said it before, and I…

January 3, 2019 | Tony DeGonia

The “Internal” Cyber Kill Chain Model

An Alternative to the “Classic” Cyber Kill Chain Model for Internal Attacks and BreachesDeveloped by Lockheed Martin, the Cyber Kill Chain® (CKC) framework is part of the Intelligence Driven Defense® model for the identification and prevention of cyber intrusions activity. The model identifies what adversaries must complete in order to achieve…

December 27, 2018 | Rohan Viegas

How Malware Sandboxes and SIEMs Work in Tandem to Effectively Detect Malware

Rohan Viegas of VMRay explains some of the key factors IT security teams should consider when evaluating a malware analysis sandbox and whether it’s a good fit for their existing SIEM environment. He then outlines how VMRay Analyzer complements and enhances the capabilities of AlienVault’s flagship platform, USM Anywhere.For IT security organizations, malware threats and…

Watch a Demo ›
GET PRICE FREE TRIAL